Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

Faculty Publications, Computer Science

Bootloader

Articles 1 - 1 of 1

Full-Text Articles in OS and Networks

Bootbandit: A Macos Bootloader Attack, Armen Boursalian, Mark Stamp Aug 2019

Bootbandit: A Macos Bootloader Attack, Armen Boursalian, Mark Stamp

Faculty Publications, Computer Science

Historically, the boot phase on personal computers left systems in a relatively vulnerable state. Because traditional antivirus software runs within the operating system, the boot environment is difficult to protect from malware. Examples of attacks against bootloaders include so‐called “evil maid” attacks, in which an intruder physically obtains a boot disk to install malicious software for obtaining the password used to encrypt a disk. The password then must be stored and retrieved again through physical access. In this paper, we discuss an attack that borrows concepts from the evil maid. We assume exploitation can be used to infect a bootloader …